{"id":"https://openalex.org/W2903855827","doi":"https://doi.org/10.1145/3290480.3290482","title":"Multi-pattern Matching Algorithm based on Variable Step Size","display_name":"Multi-pattern Matching Algorithm based on Variable Step Size","publication_year":2018,"publication_date":"2018-11-02","ids":{"openalex":"https://openalex.org/W2903855827","doi":"https://doi.org/10.1145/3290480.3290482","mag":"2903855827"},"language":"en","primary_location":{"id":"doi:10.1145/3290480.3290482","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3290480.3290482","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 8th International Conference on Communication and Network Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5067145421","display_name":"Dapeng Man","orcid":"https://orcid.org/0000-0003-1177-3693"},"institutions":[{"id":"https://openalex.org/I151727225","display_name":"Harbin Engineering University","ror":"https://ror.org/03x80pn82","country_code":"CN","type":"education","lineage":["https://openalex.org/I151727225"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Dapeng Man","raw_affiliation_strings":["Harbin Engineering University, Information Security Research Center, Harbin, China"],"affiliations":[{"raw_affiliation_string":"Harbin Engineering University, Information Security Research Center, Harbin, China","institution_ids":["https://openalex.org/I151727225"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5067423683","display_name":"Wu Yang","orcid":"https://orcid.org/0000-0001-5985-7648"},"institutions":[{"id":"https://openalex.org/I151727225","display_name":"Harbin Engineering University","ror":"https://ror.org/03x80pn82","country_code":"CN","type":"education","lineage":["https://openalex.org/I151727225"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wu Yang","raw_affiliation_strings":["Harbin Engineering University, Information Security Research Center, Harbin, China"],"affiliations":[{"raw_affiliation_string":"Harbin Engineering University, Information Security Research Center, Harbin, China","institution_ids":["https://openalex.org/I151727225"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5074523871","display_name":"Guoqing Tian","orcid":"https://orcid.org/0000-0003-4655-0123"},"institutions":[{"id":"https://openalex.org/I151727225","display_name":"Harbin Engineering University","ror":"https://ror.org/03x80pn82","country_code":"CN","type":"education","lineage":["https://openalex.org/I151727225"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guoqing Tian","raw_affiliation_strings":["Harbin Engineering University, Information Security Research Center, Harbin, China"],"affiliations":[{"raw_affiliation_string":"Harbin Engineering University, Information Security Research Center, Harbin, China","institution_ids":["https://openalex.org/I151727225"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5067145421"],"corresponding_institution_ids":["https://openalex.org/I151727225"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.14620279,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"125","last_page":"128"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11269","display_name":"Algorithms and Data Compression","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11269","display_name":"Algorithms and Data Compression","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10627","display_name":"Advanced Image and Video Retrieval Techniques","score":0.989300012588501,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.9818999767303467,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/variable","display_name":"Variable (mathematics)","score":0.6268556714057922},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5616419315338135},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.5340750217437744},{"id":"https://openalex.org/keywords/matching","display_name":"Matching (statistics)","score":0.5175001621246338},{"id":"https://openalex.org/keywords/pattern-matching","display_name":"Pattern matching","score":0.45238566398620605},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.3335736393928528},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.32254183292388916},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.24497810006141663},{"id":"https://openalex.org/keywords/statistics","display_name":"Statistics","score":0.10540235042572021}],"concepts":[{"id":"https://openalex.org/C182365436","wikidata":"https://www.wikidata.org/wiki/Q50701","display_name":"Variable (mathematics)","level":2,"score":0.6268556714057922},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5616419315338135},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.5340750217437744},{"id":"https://openalex.org/C165064840","wikidata":"https://www.wikidata.org/wiki/Q1321061","display_name":"Matching (statistics)","level":2,"score":0.5175001621246338},{"id":"https://openalex.org/C68859911","wikidata":"https://www.wikidata.org/wiki/Q1503724","display_name":"Pattern matching","level":2,"score":0.45238566398620605},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.3335736393928528},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.32254183292388916},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.24497810006141663},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.10540235042572021},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3290480.3290482","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3290480.3290482","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 8th International Conference on Communication and Network Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W15130811","https://openalex.org/W118527173","https://openalex.org/W2021637567","https://openalex.org/W2030995323","https://openalex.org/W2068356565","https://openalex.org/W2160907800","https://openalex.org/W2248278495","https://openalex.org/W2376008119","https://openalex.org/W2565009033","https://openalex.org/W4233018289"],"related_works":["https://openalex.org/W2051487156","https://openalex.org/W2073681303","https://openalex.org/W2544423928","https://openalex.org/W2053286651","https://openalex.org/W2181743346","https://openalex.org/W2187401768","https://openalex.org/W2943461603","https://openalex.org/W3210429500","https://openalex.org/W3217252310","https://openalex.org/W4286894112"],"abstract_inverted_index":{"By":[0],"analyzing":[1],"the":[2,15,21,29,53,56,60,64,70,75,81,91,99,118,124,130,137],"existing":[3],"pattern":[4,93,100,119],"matching":[5,23,33,45,65,77,86,135],"algorithms,":[6],"we":[7],"found":[8],"AC_BM":[9,143],"algorithm":[10,13,19,46,139,144],"or":[11,55,134],"AC_SUNDAY":[12,146],"combine":[14],"advantages":[16],"of":[17,74,132],"AC":[18],"and":[20,145],"single-pattern":[22],"algorithms.":[24],"When":[25,51],"a":[26],"mismatch":[27,54],"occurs,":[28],"moving":[30,61,133],"distance":[31,62,84],"on":[32,38,63,85],"trees":[34],"become":[35],"larger.":[36],"Based":[37],"this":[39],"idea,":[40],"an":[41],"improved":[42],"jump":[43,83],"step":[44],"named":[47],"AC_ID":[48],"is":[49,58,67,140],"proposed.":[50],"occurs":[52],"scanning":[57],"over,":[59],"tree":[66,87],"determined":[68],"by":[69],"first":[71],"four":[72,97],"characters":[73],"current":[76],"window.":[78],"It":[79],"make":[80],"maximum":[82],"be":[88],"equal":[89],"to":[90,113,116],"shortest":[92],"string":[94,101,107,120],"length":[95],"plus":[96],"in":[98],"set.":[102],"Furthermore,":[103],"two":[104],"fields":[105],"(pattern":[106],"length,":[108],"initial":[109],"position)":[110],"are":[111],"added":[112],"each":[114],"node":[115],"process":[117],"with":[121],"anchoring.":[122],"Finally,":[123],"experiment":[125],"results":[126],"show":[127],"that":[128],"either":[129],"number":[131],"time,":[136],"proposed":[138],"better":[141],"than":[142],"algorithm.":[147]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
